首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3243篇
  免费   174篇
  国内免费   26篇
电工技术   57篇
综合类   8篇
化学工业   913篇
金属工艺   86篇
机械仪表   121篇
建筑科学   126篇
矿业工程   12篇
能源动力   254篇
轻工业   216篇
水利工程   50篇
石油天然气   28篇
无线电   331篇
一般工业技术   518篇
冶金工业   119篇
原子能技术   24篇
自动化技术   580篇
  2024年   5篇
  2023年   71篇
  2022年   120篇
  2021年   238篇
  2020年   159篇
  2019年   222篇
  2018年   242篇
  2017年   204篇
  2016年   203篇
  2015年   137篇
  2014年   237篇
  2013年   331篇
  2012年   221篇
  2011年   232篇
  2010年   183篇
  2009年   131篇
  2008年   87篇
  2007年   55篇
  2006年   50篇
  2005年   42篇
  2004年   37篇
  2003年   24篇
  2002年   14篇
  2001年   9篇
  2000年   22篇
  1999年   13篇
  1998年   20篇
  1997年   7篇
  1996年   11篇
  1995年   17篇
  1994年   8篇
  1993年   12篇
  1992年   6篇
  1991年   4篇
  1990年   9篇
  1989年   10篇
  1987年   4篇
  1986年   2篇
  1985年   5篇
  1984年   4篇
  1983年   7篇
  1982年   2篇
  1981年   2篇
  1980年   4篇
  1979年   4篇
  1978年   2篇
  1976年   4篇
  1974年   4篇
  1973年   2篇
  1972年   2篇
排序方式: 共有3443条查询结果,搜索用时 0 毫秒
21.
A theoretical model for electrons escaping a quantum well under the influence of an applied electric field is developed. Both the thermionic emission and tunneling components of the currents are calculated, taking into account the proper partitioning between the two currents. The group velocity for a nonuniform electron distribution within the quantum well, which is a function of position and energy, and the continuous energy dependence of the quantum well density of states is considered. A comparison between this model and previously reported experimental results are made which demonstrates excellent agreement  相似文献   
22.

In this paper, an algorithm is proposed for detection and joint estimation of parameters of multiple targets using rotating antenna array. This paper is sequel to our previous work addressing a two element antenna array only. Joint estimation of number of targets, the targets’ range, Doppler and their directions of arrivals is carried while the effects of antenna rotation are compensated for a multi element linear array. The effectiveness of the algorithm is verified by the simulation results carried out for an eight element array. The proposed algorithm is able to resolve targets with same range and Doppler. The computations of the proposed algorithm are calculated and comparison is also given with other algorithms.

  相似文献   
23.
The growth of the networks has difficult network management. Recently, a concept called software‐defined network (SDN) has been proposed to address this issue, which makes network management more adaptable. Control and forwarding planes are separated in SDN. The control plane is a centralized logical controller that controls the network. The forwarding plane that consists of transfer devices is responsible for transmitting packets. Because the network resources are limited, optimizing the use of resources in the networks is an important issue. Load balancing improves the balanced distribution of loads across multiple resources in order to maximize the reliability and network resources efficiency. SDN controllers can create an optimal load balancing compared to traditional networks because they have a network global view. The load‐balancing problem can be solved using many different nature‐inspired meta‐heuristic techniques because it has the NP‐complete nature. Hence, for solving load balancing problem in SDN, nature‐inspired meta‐heuristic techniques are important methods. However, to the best of our knowledge, there is not a survey or systematic review on studying these matters. Accordingly, in the area of the load balancing in the SDN, this paper reviews systematically the nature‐inspired meta‐heuristic techniques. Also, this study demonstrates advantages and disadvantages regarded of the chosen nature‐inspired meta‐heuristic techniques and considers their algorithms metrics. Moreover, to apply better load balancing techniques in the future, the important challenges of these techniques have been investigated.  相似文献   
24.
The mobile cloud computing (MCC) has enriched the quality of services that the clients access from remote cloud‐based servers. The growth in the number of wireless users for MCC has further augmented the requirement for a robust and efficient authenticated key agreement mechanism. Formerly, the users would access cloud services from various cloud‐based service providers and authenticate one another only after communicating with the trusted third party (TTP). This requirement for the clients to access the TTP during each mutual authentication session, in earlier schemes, contributes to the redundant latency overheads for the protocol. Recently, Tsai et al have presented a bilinear pairing based multi‐server authentication (MSA) protocol, to bypass the TTP, at least during mutual authentication. The scheme construction works fine, as far as the elimination of TTP involvement for authentication has been concerned. However, Tsai et al scheme has been found vulnerable to server spoofing attack and desynchronization attack, and lacks smart card‐based user verification, which renders the protocol inapt for practical implementation in different access networks. Hence, we have proposed an improved model designed with bilinear pairing operations, countering the identified threats as posed to Tsai scheme. Additionally, the proposed scheme is backed up by performance evaluation and formal security analysis.  相似文献   
25.
The next generation video surveillance systems are expected to face challenges in providing computation support for an unprecedented amount of video streams from multiple video cameras in a timely and scalable fashion. Cloud computing offers huge computation resources for large-scale storage and processing on demand, which are deemed suitable for video surveillance tasks. Cloud also provides quality of service guaranteed hardware and software solutions with the virtual machine (VM) technology using a utility-like service costing model. In cloud-based video surveillance context, the resource requests to handle video surveillance tasks are translated in the form of VM resource requests, which in turn are mapped to VM resource allocation referring to physical server resources hosting the VMs. Due to the nature of video surveillance tasks, these requests are highly time-constrained, heterogeneous and dynamic in nature. Hence, it is very challenging to actually manage the cloud resources from the perspective of VM resource allocation given the stringent requirements of video surveillance tasks. This paper proposes a computation model to efficiently manage cloud resources for surveillance tasks allocation. The proposed model works on optimizing the trade-off between average service waiting time and long-term service cost, and shows that long-term service cost is inversely proportional to high and balanced utilization of cloud resources. Experiments show that our approach provides a near-optimal solution for cloud resource management when handling the heterogeneous and unpredictable video surveillance tasks dynamically over next generation network.  相似文献   
26.
27.
This paper presents a novel system simulation methodology based on the known Monte Carlo technique, used for reliability and failure mode analysis of complex and large systems. The presented approach, called “state-merging and assorted random-testing” (SMART), is particularly applicable to systems involving different types of clusters of identical components, and is ideally suited for simulation of huge memories and similar systems. Simulators based on this approach are insensitive to the number of system components, system reliability or the number of associated spares or standby units, and thus they afford an extremely small simulation time compared to the accelerated Monte Carlo simulation time.  相似文献   
28.
A two-stage thermocatalytic upgrading process using a novel catalyst was investigated to produce light olefins and liquid fuels from fuel oil. The upgraded oil from the first thermal stage demonstrated lower viscosity and higher crackability compared to the virgin feedstock. In the next step, the vapor-phase catalytic cracking of the upgraded fraction was implemented over a novel nanoporous composite catalyst, characterized by the XRD, FTIR, NH3- TPD, and N2 physisorption techniques. In total, more than 55?wt% of light olefins, particularly propylene (25.5?wt%) together with 25.4?wt% and 32.5?wt% of gasoline and diesel fuel were obtained in this process.  相似文献   
29.
30.
The proper placement of visual sensors across a sensor field for covering targets with arbitrary location and orientation is a mission-critical decision in surveillance applications. The specifics of sensor deployment in these applications not only determine the maximum achievable coverage, but it also affects the quality of the target’s appearance in cameras for subsequent use in vision tasks. However, the inaccuracies inherent in localization techniques and the lack of knowledge regarding the target orientation render existing proposals insufficient for real-life scenarios. In this paper, we address both challenges. First, we extend the conventional point representation of targets with a circular model to account for full-angle coverage of targets with known location yet with unknown orientation from all directions. We then assume, in the absence of precise location information, a trajectory profile of targets could instead be generated through the importance sampling of the environment, indicating spots where the target is most likely located. This profile-based abstraction enables us to capture the uncertainty in target’s location by encircling every agglomeration of proximal samples within one cluster. Each cluster can then be viewed as a virtual macroscopic circular target for which we formulate the coverage problem in terms of a Binary Integer Programming (BIP) model. We have also taken into account the presence of obstruction in between multiple targets by calculating the angles of view of the sensors in an occlusion-dependant manner, effectively determining optimal placement for maximal instead of full-angle coverage. Evaluation results derived from our simulation experiments reveal that the proposed mechanism can effectively achieve high coverage accuracy with minimum number of deployed sensors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号